-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Christophe Devine wrote:
| The following program can be used to test if a x86 Linux system | is vulnerable to the do_mremap() exploit; use at your own risk. | | $ cat mremap_poc.c |
This didnt do anything on my 2.4.23-grsec kernel.
- -- Daniel -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQE/+vZz1PIgHh6MkiIRAiqNAKCiuyxtA9rgaAS+eT3o9ATvLE7EuQCeJAZP Xf8JIDehgtGba4b1Eb2Qv0w= =xyYM -----END PGP SIGNATURE-----
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
